会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Packet capture collection tasking system
    • US10038603B1
    • 2018-07-31
    • US15051475
    • 2016-02-23
    • AREA 1 SECURITY, INC.
    • Blake DarcheJavier CastroChiraag Aval
    • G06F15/173H04L12/26
    • H04L43/028H04L43/04H04L43/12
    • A method and apparatus for packet capture is provided. A computer system comprises: a plurality of sensor computers each programmed to capture data packets directed to a different compromised computer from one or more attacker computers; a command server that is programmed to identify a first packet capture filter of a plurality of packet capture filters for a first sensor computer of the plurality of sensor computers, to transmit, via a communications network, the first packet capture filter to the first sensor computer of a plurality of sensor computers, wherein the first packet capture filter is programmed to cause the first sensor computer to capture a first set of data packets that have been routed toward a first compromised computer, and to identify a second packet capture filter of the plurality of packet capture filters for a second sensor computer of the plurality of sensor computers, to send, via the communications network, wherein the second packet capture filter is programmed to cause the second sensor computer to capture a second set of data packets that have been routed toward a second compromised computer, and to instruct the first sensor computer to capture data packets using the first packet capture filter and to instruct the second sensor computer to capture a second set of data packets using the second packet capture filter.
    • 3. 发明授权
    • Distribution of security rules among sensor computers
    • 传感器计算机之间的安全规则分布
    • US09350750B1
    • 2016-05-24
    • US14678691
    • 2015-04-03
    • AREA 1 SECURITY, INC.
    • Chiraag AvalSandeep Mandala
    • H04L29/06H04L29/08
    • H04L63/145H04L63/1416H04L63/1425H04L63/1466H04L67/02H04L67/06H04L67/34H04L2463/146
    • Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are provided. The rules comprise detection data used by a sensor computer to detect a potential security threat and a specified remediation measure that is caused to be performed when the security threat is detected. A security control computer generates the rules from record of series of actions created by the sensor computer, generates a rule, and distributes the rule to the sensor computers. The sensor computers periodically poll a central database for new rules and store a copy of each rule locally. Using the locally stored rules, the sensor computers can more efficiently and accurately respond to security threats.
    • 提供了在具有逻辑上连接到受损计算机的一个或多个传感器计算机的网络环境中生成规则的系统和方法。 规则包括由传感器计算机使用以检测潜在的安全威胁的检测数据和当检测到安全威胁时被执行的指定的修复措施。 安全控制计算机从传感器计算机创建的一系列动作的记录生成规则,生成规则,并将规则分发给传感器计算机。 传感器计算机定期轮询中央数据库以获取新规则,并在本地存储每个规则的副本。 使用本地存储的规则,传感器计算机可以更有效和准确地响应安全威胁。
    • 5. 发明授权
    • Packet capture collection tasking system
    • US10587483B1
    • 2020-03-10
    • US16050451
    • 2018-07-31
    • AREA 1 SECURITY, INC.
    • Blake DarcheJavier CastroChiraag Aval
    • H04L12/26
    • A method and apparatus for packet capture is provided. A computer system comprises: a plurality of sensor computers each programmed to capture data packets directed to a different compromised computer from one or more attacker computers; a command server that is programmed to identify a first packet capture filter of a plurality of packet capture filters for a first sensor computer of the plurality of sensor computers, to transmit, via a communications network, the first packet capture filter to the first sensor computer of a plurality of sensor computers, wherein the first packet capture filter is programmed to cause the first sensor computer to capture a first set of data packets that have been routed toward a first compromised computer, and to identify a second packet capture filter of the plurality of packet capture filters for a second sensor computer of the plurality of sensor computers, to send, via the communications network, wherein the second packet capture filter is programmed to cause the second sensor computer to capture a second set of data packets that have been routed toward a second compromised computer, and to instruct the first sensor computer to capture data packets using the first packet capture filter and to instruct the second sensor computer to capture a second set of data packets using the second packet capture filter.
    • 6. 发明授权
    • Remediating computer security threats using distributed sensor computers
    • 使用分布式传感器计算机来修复计算机安全威胁
    • US09374385B1
    • 2016-06-21
    • US14536493
    • 2014-11-07
    • AREA 1 SECURITY, INC.
    • Oren FalkowitzPhilip SymeBlake Darche
    • G06F11/00H04L29/06
    • H04L63/145H04L63/02H04L63/0227H04L63/1441
    • A data processing system comprises a security control computer performing operations comprising: receiving, an advertising exchange network computer, advertising presentation data indicating presentations of advertisements to particular browsers that have browsed to particular websites; determining, based upon detection data, whether the particular websites are associated with network attacks or malware; in response, storing transit data specifying computers that have visited the particular web sites and using the transit data to determine a plurality of particular web pages to inspect for threats; based on a hierarchical structure of the particular web pages and without consideration of content of the particular web pages, identifying one or more features, of links in the particular web page or files referenced in the particular web pages, that indicate one or more security threats in the web pages; and determining remediation measures to remediate security threats that are identified in one of the particular web pages.
    • 数据处理系统包括执行操作的安全控制计算机,包括:广告交换网络计算机,向特定网站浏览的特定浏览器的广告的广告呈现数据; 基于检测数据确定特定网站是否与网络攻击或恶意软件相关联; 作为响应,存储指定已访问特定网站的计算机的传输数据,并使用传输数据来确定多个特定网页以检查威胁; 基于特定网页的分层结构,并且不考虑特定网页的内容,识别特定网页中的链接或特定网页中引用的文件中的一个或多个特征,其指示一个或多个安全威胁 在网页中 以及确定修复措施来修复在特定网页之一中识别的安全威胁。
    • 9. 发明授权
    • Detecting computer security threats in electronic documents based on structure
    • 基于结构检测电子文档中的计算机安全威胁
    • US09124622B1
    • 2015-09-01
    • US14536534
    • 2014-11-07
    • AREA 1 SECURITY, INC.
    • Oren FalkowitzPhilip Syme
    • H04L29/00H04L29/06G06Q30/02
    • H04L63/1416G06Q30/0275H04L63/02H04L63/0227H04L67/02H04L67/10H04L67/12H04L67/18H04L67/32
    • In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages, a particular web page to retrieve from one of a plurality of internet sources; causing retrieving a copy of the particular web page from a particular internet source; determining a hierarchical structure of the particular web page; based upon a hierarchical structure of the particular web page and without consideration of content of the particular web page, identifying one or more features, of links in the particular web page or files referenced in the particular web page, that indicate one or more security threats; determining a reputation score for the particular web page; determining a specified remediation measure, based upon the reputation score, to remediate a security threat that is identified in the particular web page; providing the specified remediation measure to one or more of a compromised computer, a sensor computer and an enterprise computer.
    • 在一个实施例中,提供计算机安全性的改进的数据处理方法包括从识别多个网页的队列中选择要从多个互联网来源之一检索的特定网页; 导致从特定互联网来源检索特定网页的副本; 确定所述特定网页的分层结构; 基于特定网页的分层结构,并且不考虑特定网页的内容,识别特定网页中的链接或特定网页中引用的文件中的一个或多个特征,其指示一个或多个安全威胁 ; 确定特定网页的信誉得分; 根据信誉分数来确定指定的修复措施来修复在特定网页中识别的安全威胁; 向受损计算机,传感器计算机和企业计算机中的一个或多个提供指定的修复措施。